Sciweavers

2838 search results - page 203 / 568
» Verifying Controlled Components
Sort
View
95
Voted
CCS
2008
ACM
15 years 2 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
115
Voted
WSCG
2000
131views more  WSCG 2000»
15 years 2 months ago
Dynamic Animation of N-Dimensional Deformable Objects
This paper presents a new, accurate, efficient and unified method for dynamic animation of one, two or three-dimensional deformable objects. The objects are modelled as d-dimensio...
Yannick Rémion, Jean-Michel Nourrit, Olivie...
ICRA
2009
IEEE
125views Robotics» more  ICRA 2009»
14 years 10 months ago
Robust hitting with dynamics shaping
The present paper proposes the motion planning based on "the dynamics shaping" for a robotic arm to hit the target robustly toward the desired direction, of which the con...
Tasuku Yamawaki, Yusuke Tsuzuki, Masahito Yashima
CSFW
2012
IEEE
13 years 3 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
CVPR
2001
IEEE
16 years 2 months ago
Dimension Recognition and Geometry Reconstruction in Vectorization of Engineering Drawings
This paper presents a novel approach for recognizing and interpreting dimensions in engineering drawings. It starts by detecting potential dimension frames, each comprising only t...
Feng Su, Jiqiang Song, Chiew-Lan Tai, Shijie Cai